Assets and Threats: Quiz 4

Assets and Threats: Quiz 4

Professional Development

29 Qs

quiz-placeholder

Similar activities

Linux Test Prep 1

Linux Test Prep 1

7th Grade - Professional Development

25 Qs

A+ - 14B - Troubleshoot Windows Networking

A+ - 14B - Troubleshoot Windows Networking

Professional Development

24 Qs

Parts of a Computer #2 - Cables and Ports

Parts of a Computer #2 - Cables and Ports

6th Grade - Professional Development

25 Qs

SDdbC#_Final Quiz

SDdbC#_Final Quiz

Professional Development

25 Qs

minecraft

minecraft

KG - Professional Development

24 Qs

fundamentos de javascript

fundamentos de javascript

Professional Development

25 Qs

Базы данных_06.02

Базы данных_06.02

Professional Development

24 Qs

BTEC Coding & Logic

BTEC Coding & Logic

12th Grade - Professional Development

24 Qs

Assets and Threats: Quiz 4

Assets and Threats: Quiz 4

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

John Coder

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

29 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Hash values are primarily used as a way to determine the int___________ of files and applications. Hashes also keep information confi____________ because they can't be decrypted.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Data integrity relates to the accuracy and consistency of information. This is known as non-repud_____________, the concept that authenticity of information can't be de___________.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

Hash values are primarily used as a way to determine the int___________ of files and applications. Hashes also keep information confi____________ because they can't be decrypted.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

To avoid the risk of hash collisions, functions that generated longer values were needed. MD5's shortcomings gave way to a new group of functions known as the sec________ has_________ algor_________, or SHAs.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Five fun__________ make up the SHA family of algorithms:

SHA-1

SHA-224

SHA-256

SHA-384

SHA-512

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A rainbow table is a file of pre-generated hash values and their associated plaintext. They’re like dictio_________ of weak passwords. Attackers capable of obtaining an organization’s password database can use a rainbow table to compare them against all possible values.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

Salting is an additional safeguard that's used to strengthen hash functions. A salt is a random str__________ of characters that's added to data before it's hashed. The additional characters produce a more unique hash value, making salted data resilient to rainbow table attacks.

For example, a database containing passwords might have several hashed entries for the password "password." If those passwords were all salted, each entry would be completely different. That means an attacker using a rainbow table would be unable to find matching values for "password" in the database.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?